Leukemia, a malignant disease characterized by the rapid proliferation of specific types of white blood cells (WBC), has prompted increased interest in leveraging automatic WBC classification system. This study presen...
详细信息
Document Recognition and Analysis is a long-standing area of study that has been actively investigated for many decades. Handwritten text recognition (HTR) in indian scripts is still in its early stages sinc...
详细信息
Nowadays, many computing systems are a part of daily life;therefore, it is more comfortable to communicate with them naturally. The field of human-computer interaction (HCI) was created in order to break down the obst...
详细信息
Logic locking has been proposed as a hardware security solution for both integrated circuits and FPGA-based design. The paper presents a secure key exchange protocol and secure LUT memory storage for the key used for ...
详细信息
Dehazing is a difficult process in computer vision that seeks to improve the clarity and excellence of pictures taken under cloudy, foggy, and rainy circumstances. The Generative Adversarial Network (GAN) has been a v...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data ***,the maj...
详细信息
Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data ***,the majority of the fog nodes in this environment are geographically scattered with resources that are limited in terms of capabilities compared to cloud nodes,thus making the application placement problem more complex than that in cloud *** approach for cost-efficient application placement in fog-cloud computing environments that combines the benefits of both fog and cloud computing to optimize the placement of applications and services while minimizing *** approach is particularly relevant in scenarios where latency,resource constraints,and cost considerations are crucial factors for the deployment of *** this study,we propose a hybrid approach that combines a genetic algorithm(GA)with the Flamingo Search Algorithm(FSA)to place application modules while minimizing *** consider four cost-types for application deployment:Computation,communication,energy consumption,and *** proposed hybrid approach is called GA-FSA and is designed to place the application modules considering the deadline of the application and deploy them appropriately to fog or cloud nodes to curtail the overall cost of the *** extensive simulation is conducted to assess the performance of the proposed approach compared to other state-of-the-art *** results demonstrate that GA-FSA approach is superior to the other approaches with respect to task guarantee ratio(TGR)and total cost.
In this system paper, we present our approach to the DJI Robomaster AI Challenge, 2022 where our team ERA-IITK was ranked 3rd worldwide among 83 teams. We primarily focus on system hardware design and algorithmic comp...
详细信息
In recent years, there has been a significant rise in the phenomenon of hate against women on social media platforms, particularly through the use of misogynous memes. These memes often target women with subtle and ob...
详细信息
With the field of technology has witnessed rapid advancements, attracting an ever-growing community of researchers dedicated to developing theories and techniques. This paper proposes an innovative ICRM (Intelligent C...
详细信息
暂无评论